PackVFL: Efficient HE Packing for Vertical Federated Learning Authors: Liu Yang, Shuowei Cai, Di Chai, Junxue Zhang, Han Tian, Yilun Jin, Kun Guo, Kai Chen, Qiang Yang | Published: 2024-05-01 Characteristics of VFLMatrix Multiplication MethodsComputational Efficiency 2024.05.01 2025.05.27 Literature Database
zkLLM: Zero Knowledge Proofs for Large Language Models Authors: Haochen Sun, Jason Li, Hongyang Zhang | Published: 2024-04-24 Prompt InjectionComputational EfficiencyWatermark Robustness 2024.04.24 2025.05.27 Literature Database
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13 FPGAResource optimizationComputational Efficiency 2024.04.13 2025.05.27 Literature Database
Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database
Privacy preserving layer partitioning for Deep Neural Network models Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingPrivacy Protection MethodComputational Efficiency 2024.04.11 2025.05.27 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 WatermarkingModel Performance EvaluationComputational Efficiency 2024.04.04 2025.05.27 Literature Database
Fluent: Round-efficient Secure Aggregation for Private Federated Learning Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10 Computational EfficiencyCommunication EfficiencyFederated Learning 2024.03.10 2025.05.27 Literature Database
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network Authors: Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng | Published: 2024-03-01 Multi-Party ComputationComputational EfficiencyCommunication Efficiency 2024.03.01 2025.05.27 Literature Database
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP Authors: Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat | Published: 2023-12-20 SQL Injection Attack DetectionWatermarkingComputational Efficiency 2023.12.20 2025.05.27 Literature Database
Rethinking Randomized Smoothing from the Perspective of Scalability Authors: Anupriya Kumari, Devansh Bhardwaj, Sukrit Jindal | Published: 2023-12-19 | Updated: 2024-10-24 Scalability AnalysisRobustness EvaluationComputational Efficiency 2023.12.19 2025.05.27 Literature Database